Opiniones del mercado

How to Manage Your Password like a CISO

Over the past decade, we have done the absolute most when it comes to passwords.We have written love letters,  pontificated on strategies, and even offered tips on how to teach your mother the tricks of the trade. And it makes sense that we have done so much when it comes to our numeric and […]

Equilibrio de Zero Trust con una fuerte estrategia de identidad y IA

The impact of the latest cybersecurity breaches is staggering. With billions of identities and sensitive data compromised, it’s clear that traditional security doesn’t solve the problem. Here’s what the latest breaches show us. Three out 5 organizations expect to be breached. On average, it takes an average of 74 days […]

Privacy And Regulation: The K-12 Edition

Children have rights to freedom and privacy. Yet, these rights, particularly privacy rights, are often denied by parents who are prone to the “sharenting” phenomenon (the oversharing by parents of their children’s life moments on social media). One must wonder, will the smart world we are building deny children these privacy […]

Mitigating Insider Threats with Privileged Access Governance

Authors: Kelvin Mbatu, Avinash Rajeev, Vivek Tejwani, Radhakrishnan Subramaniyan Enterprises have become increasingly reliant on digital information to meet business objectives, effectively manage operations, and compete in a digitally connected world. The digital ecosystem demands that organizations transform their identity and access management (IAM) programs to protect and monitor critical […]

How to Get Hacked This Holiday Season

Editor’s note: This is satire. SailPoint strongly encourages you to take your cybersecurity very seriously, and if you’re looking for some ways to do that then head over to this blog post. The season of giving and goodwill has arrived once more. Jolly tunes are playing in the distance, department stores are raising their holiday […]

The Importance of Identity in a Hybrid IT World

If your organization is like many, you’re moving more and more applications to the cloud or introducing numerous APIs into your environment as a part your digital transformation. Wherever you are in the various stages of your cloud journey, even if you have a cloud-first mandate, you will find yourself […]

2019 Market Pulse Survey: Good Bot, Bad Bot

There are two sides to every coin. This analogy is especially true when we talk about the ever-present use of software bots in organizations today. On one side of the coin, we can all agree that bots are time-savers. In one case, bots helped this company automate over 100 tasks […]

Permitir el crecimiento empresarial y fortalecer la seguridad

Los consumidores exigen la adopción rápida de un panorama puramente digital, y en el centro de los desafíos actuales se encuentran las identidades comprometidas. ¿Qué utilizan los agentes de las amenazas para obtener acceso a sus datos? La identidad. Y, al igual que en la explosión de datos, los métodos de los agentes de las amenazas son más sofisticados y precisos que nunca, lo que hace que […]

Equilibrio de Zero Trust con una fuerte estrategia de identidad y IA

El impacto de las últimas infracciones de ciberseguridad es asombroso. Con miles de millones de identidades y datos confidenciales comprometidos, está claro que la seguridad tradicional no resuelve el problema. Esto es lo que nos muestran los últimos quebrantamientos: tres de cada 5 organizaciones esperan sufrir algún quebrantamiento. En promedio, se necesita un promedio de 74 […]

Guía paso a paso de cumplimiento del RGPD

California es solo uno de los muchos estados que promulga una legislación que pone la responsabilidad de la privacidad en manos de las empresas. Hay 54 días hasta que el CCPA entre en vigor, pero ¿quién lleva la cuenta? Si hace negocios en California, entonces probablemente debería llevarla.   El CCPA en particular afecta […]